Cisco Talos <[email protected]> added the comment:

Thanks for acknowledging.  We look forward to any updates/developments on the 
issue reported.

For further information about the Cisco Vendor Vulnerability Reporting and 
Disclosure Policy please refer to this document which also links to our public 
PGP key. 
https://tools.cisco.com/security/center/resources/vendor_vulnerability_policy.html

Kind Regards,

Regina Wilson
Analyst.Business Operations
[email protected]<mailto:[email protected]>

[cid:[email protected]]

On Jan 15, 2019, at 11:30 AM, Christian Heimes 
<[email protected]<mailto:[email protected]>> wrote:

Christian Heimes <[email protected]<mailto:[email protected]>> added the comment:

Thanks for the report!

----------
assignee:  -> christian.heimes
components: +SSL
nosy: +christian.heimes
stage:  -> needs patch
versions: +Python 3.4, Python 3.5, Python 3.6, Python 3.7, Python 3.8

_______________________________________
Python tracker <[email protected]<mailto:[email protected]>>
<https://bugs.python.org/issue35746>
_______________________________________

----------
Added file: https://bugs.python.org/file48054/image001.png

_______________________________________
Python tracker <[email protected]>
<https://bugs.python.org/issue35746>
_______________________________________
_______________________________________________
Python-bugs-list mailing list
Unsubscribe: 
https://mail.python.org/mailman/options/python-bugs-list/archive%40mail-archive.com

Reply via email to